.iit_roorkee_cybersecurity_sec_1__dJ8_0{background-image:url(https://cdn.pegasus.imarticus.org/iit_roorkee_cs/Group_3090.webp);background-position:50%;background-size:cover;background-repeat:no-repeat;color:#fff;padding-left:136px;padding-right:136px;width:100%;margin-top:40px}.iit_roorkee_cybersecurity_sec_para__GRXq3{font-style:normal;font-weight:700;font-size:34px;line-height:40px;text-transform:capitalize}.iit_roorkee_cybersecurity_courseName__2Tg2E{padding-top:40px;width:100%}.iit_roorkee_cybersecurity_paymentPadding__dJX_G{padding:0 0 0 24px}.iit_roorkee_cybersecurity_sec1_para__1rj9g{font-style:normal;font-weight:400;font-size:24px;line-height:24px;color:#fff;margin-top:8px}.iit_roorkee_cybersecurity_ourAlumni__AD6_q{margin-top:168px}.iit_roorkee_cybersecurity_alumniHeader__qyQ7O{font-style:normal;font-weight:700;font-size:34px;line-height:40px;text-align:center;text-transform:capitalize;color:#3c4852}.iit_roorkee_cybersecurity_calendar__KoU94{background-image:url(https://cdn.pegasus.imarticus.org/pgBandF/icon-Frame.webp)}.iit_roorkee_cybersecurity_calendar__KoU94,.iit_roorkee_cybersecurity_modeOfTraining__IJKjH{background-position:50%;background-size:auto;background-repeat:no-repeat;height:46px;width:48px}.iit_roorkee_cybersecurity_modeOfTraining__IJKjH{background-image:url(https://cdn.pegasus.imarticus.org/pgBandF/ModeOfLearning.webp)}.iit_roorkee_cybersecurity_students__qRTXn{background-image:url(https://cdn.pegasus.imarticus.org/pgBandF/Students.webp)}.iit_roorkee_cybersecurity_students__qRTXn,.iit_roorkee_cybersecurity_time__VvbLw{background-position:50%;background-size:auto;background-repeat:no-repeat;height:46px;width:48px}.iit_roorkee_cybersecurity_time__VvbLw{background-image:url(https://cdn.pegasus.imarticus.org/pgBandF/Time.webp)}.iit_roorkee_cybersecurity_border_right__uAful{border-right:1px solid rgba(60,72,82,.25);height:50%;display:flex;flex-direction:row;justify-content:center;align-items:center;width:33.3%}.iit_roorkee_cybersecurity_sec_main_1__Ah43n{display:flex;flex-direction:row;justify-content:space-between;width:100%;margin-left:-8px}.iit_roorkee_cybersecurity_alumni__DB94W{margin-bottom:72px;width:100%;display:flex;flex-direction:row;justify-content:center;margin-top:32px}.iit_roorkee_cybersecurity_sec1_para2__xPuB2{font-style:normal;font-weight:600;font-size:18px;line-height:24px;text-shadow:0 0 24px rgba(0,0,0,.25);margin-left:-8px;margin-top:-72px}.iit_roorkee_cybersecurity_sec_main_1_sec__UOvXx{width:100%;margin-bottom:-40px}.iit_roorkee_cybersecurity_headerImage__ZL8mu{width:482px;height:322px;margin-top:72px;position:relative}.iit_roorkee_cybersecurity_projectMain__MhQOw{margin:48px 0 0 136px}.iit_roorkee_cybersecurity_projectCard1__C5qTV{width:400px;border-radius:8px}.iit_roorkee_cybersecurity_projectCard__rIR3W{width:370px;height:397px;background:#fff;border-radius:8px;display:flex;flex-direction:column}.iit_roorkee_cybersecurity_projectCardImage__Bf7b_{width:370px;height:178px;border-radius:8px;position:relative}.iit_roorkee_cybersecurity_projectCardHeader__jGfCd{font-style:normal;font-weight:600;font-size:18px;line-height:24px;text-transform:uppercase;margin:24px 24px 0}.iit_roorkee_cybersecurity_projectCardPara__MPY74{margin:32px 24px 16px;font-style:normal;font-weight:400;font-size:18px;line-height:24px;color:#3c4852}.iit_roorkee_cybersecurity_certificatecontainerdiv__vxnNI{display:flex;flex-direction:row;justify-content:space-between;width:100%}.iit_roorkee_cybersecurity_externalDivHeader__RGhUw{font-style:normal;font-weight:400;font-size:18px;line-height:24px;color:#3c4852;width:80%;margin:0 0 0 24px}.iit_roorkee_cybersecurity_externalDivHeaderPara__wdSsM{font-style:normal;font-weight:600;font-size:20px;line-height:38px;color:#3c4852;margin-left:24px}.iit_roorkee_cybersecurity_certificateleftimg__MOMvf{width:502px;height:352px}.iit_roorkee_cybersecurity_certiMainconatiner__9nQtz{width:60%}.iit_roorkee_cybersecurity_certificateMainleftimg__nIon2{margin-right:136px;width:50%;display:flex;flex-direction:row;justify-content:flex-end;margin-bottom:80px}.iit_roorkee_cybersecurity_partnerZoom__UhzOK{position:absolute;bottom:2vh;right:2vw}.iit_roorkee_cybersecurity_projectHeaderDiv__fqdbD{margin:80px 0 0 136px}.iit_roorkee_cybersecurity_projectParaDiv__yJGrk{width:80%;margin:24px 0 0 136px}.iit_roorkee_cybersecurity_projectParaDiv12___ZAMD{margin:24px 136px 0}.iit_roorkee_cybersecurity_certicontainerdiv3__0YCKR{display:flex;flex-direction:row;justify-content:space-between;margin:40px 0 0 136px;width:60%}.iit_roorkee_cybersecurity_grow__whG6b{background-image:url(https://cdn.pegasus.imarticus.org/iit_roorkee_dm/Vector.webp);background-position:50%;background-size:cover;background-repeat:no-repeat;padding:112px 136px 0}.iit_roorkee_cybersecurity_careerSupportHeader___o9hZ{font-style:normal;font-weight:700;font-size:34px;line-height:40px;text-transform:capitalize;color:#3c4852}.iit_roorkee_cybersecurity_careerSupportText__b7yrn{font-style:normal;font-weight:400;font-size:18px;line-height:24px;color:#3c4852;margin-top:24px}.iit_roorkee_cybersecurity_growMargin__jXsqW{margin-top:48px;margin-bottom:104px;width:258px;height:56px;background:#035642;border-radius:8px;display:flex;flex-direction:row;justify-content:space-evenly;align-items:center;font-style:normal;font-weight:400;font-size:18px;line-height:24px;text-align:center;border:1px solid #035642;color:#fff}.iit_roorkee_cybersecurity_facultyHead__RzcK4{font-style:normal;font-weight:700;font-size:34px;line-height:40px;text-transform:capitalize;color:#3c4852;width:100%;display:flex;flex-direction:row;justify-content:center;padding-top:80px}.iit_roorkee_cybersecurity_facultyMobile12__taV1m{height:210px;width:100%;margin-top:48px}.iit_roorkee_cybersecurity_facultyMobile12__taV1m>div>div{display:flex;flex-direction:row;justify-content:flex-start}.iit_roorkee_cybersecurity_facultyMobile12__taV1m>div>div>div{margin-right:32px}.iit_roorkee_cybersecurity_faculty__xvbk9{background:rgba(221,233,237,.35)}.iit_roorkee_cybersecurity_facultyMobile__7ct8g{padding-bottom:0;padding-left:136px;padding-right:136px}.iit_roorkee_cybersecurity_facultyHeader___CJQI{font-style:normal;font-weight:700;font-size:28px;line-height:38px;display:flex;align-items:center;flex-direction:row;justify-content:center;text-transform:capitalize;color:#fff;padding:80px 136px 0}.iit_roorkee_cybersecurity_facultyMain__S3snE{display:flex;flex-direction:row;justify-content:center;padding:48px 136px 80px 168px}.iit_roorkee_cybersecurity_partnerCard__xD9Gf{width:570px;height:204px;background:#fff;border-radius:8px;display:flex;flex-direction:row;margin-right:32px}.iit_roorkee_cybersecurity_partnerCard1__A1GTi{display:flex;flex-direction:column;padding:16px 24px 16px 16px;width:70%}.iit_roorkee_cybersecurity_partnerImage__oQ_OG{width:180px;height:204px}.iit_roorkee_cybersecurity_partnerpara3__rKd7N{font-style:normal;font-weight:600;font-size:14px;line-height:20px;display:flex;align-items:center;color:#3c4852;width:60%}.iit_roorkee_cybersecurity_partnerpara2__KhNfU{font-style:normal;font-weight:400;font-size:16px;line-height:22px;letter-spacing:.01em;color:#3c4852;margin-top:8px}.iit_roorkee_cybersecurity_FieldColor__Yf_nl:checked{color:#fff}.iit_roorkee_cybersecurity_certificateleftimgMobile__nHd9f,.iit_roorkee_cybersecurity_courseNameMobile__Ofj10,.iit_roorkee_cybersecurity_partnerMobile__5Hp5x,.iit_roorkee_cybersecurity_weba_new_controls__0a6fy,.iit_roorkee_cybersecurity_weba_new_controlss__pNAjJ{display:none}.iit_roorkee_cybersecurity_feeSection__tMdC2{padding:104px 136px}.iit_roorkee_cybersecurity_triangleMain__ZvIZP{width:0;height:0;border-top:24px dotted transparent;border-bottom:24px dashed transparent;border-left:24px dashed #68c29d;position:absolute;top:170px;left:268px}.iit_roorkee_cybersecurity_uniqueMain__tre5n{margin:48px 136px 0}.iit_roorkee_cybersecurity_aboutcontainerdiv2__7hpbH{margin:80px 136px 0}.iit_roorkee_cybersecurity_aboutEnquire__aVP_d{display:flex;flex-direction:row;justify-content:center;margin-top:48px;margin-bottom:104px}.iit_roorkee_cybersecurity_partnerbutton__Ek4E_{width:230px;height:56px;background:#fff;border-radius:8px;border:1px solid #fff}.iit_roorkee_cybersecurity_aboutContainer__CG6Ly{display:flex;flex-direction:row;justify-content:normal;background:rgba(221,233,237,.75);margin:56px 136px 80px;border-radius:8px;gap:48px}.iit_roorkee_cybersecurity_aboutContainer1__YntuO{display:flex;flex-direction:column;margin:32px 0 32px 32px}.iit_roorkee_cybersecurity_aboutContainer11__1dO_p{display:flex;flex-direction:row;margin-top:8px;justify-content:space-between}.iit_roorkee_cybersecurity_aboutContainerImage__BqWYG{width:480px;height:96px;background:#fff;border:1px solid #47c3cf;border-radius:8px;padding:8px 24px}.iit_roorkee_cybersecurity_aboutContainerMain__a264j{width:234px;height:80px;background-color:#fff;border:1px solid #47c3cf;border-radius:8px;display:flex;flex-direction:row;justify-content:center;align-items:center}.iit_roorkee_cybersecurity_aboutContainerMainHead__SAwUb{font-style:normal;font-weight:600;font-size:28px;line-height:32px;color:#3c4852}.iit_roorkee_cybersecurity_aboutContainerMainHead1__XDnXh{display:flex;flex-direction:column;justify-content:center;margin-left:16px}.iit_roorkee_cybersecurity_aboutContainerMainRank__dOEOZ{font-style:normal;font-weight:600;font-size:18px;line-height:24px;color:#3c4852}.iit_roorkee_cybersecurity_aboutContainerMainRank1__aHJmF{font-style:normal;font-weight:400;font-size:14px;line-height:20px;color:#3c4852}.iit_roorkee_cybersecurity_aboutContainerMain1para__xHzQ0{font-style:normal;font-weight:600;font-size:24px;line-height:32px;color:#3c4852;width:90%}.iit_roorkee_cybersecurity_aboutContainerMain1para2__UcwYi{font-style:normal;font-weight:600;font-size:16px;line-height:24px;color:#3c4852;margin-left:16px;margin-top:-8px}.iit_roorkee_cybersecurity_aboutMargin__ZXsah{margin-top:24px}.iit_roorkee_cybersecurity_aboutContainerMain1__2wxOT{margin:32px 0}.iit_roorkee_cybersecurity_projectHeaderDiv12__ff7nO{margin:80px 136px 0}.iit_roorkee_cybersecurity_similiarProgram_cs__ljSPF{padding:104px 0 104px 136px;width:88%}.iit_roorkee_cybersecurity_iitrcybersecurityform__Cy9BI{margin-top:96px}@media screen and (max-width:1350px){.iit_roorkee_cybersecurity_aboutContainer__CG6Ly{flex-direction:column}.iit_roorkee_cybersecurity_aboutContainerImage__BqWYG{width:598px;height:120px;padding:16px 24px}.iit_roorkee_cybersecurity_aboutContainer1__YntuO{margin:32px 0 0}.iit_roorkee_cybersecurity_aboutContainer13__dPRD4{display:flex;flex-direction:row;justify-content:center;width:100%}.iit_roorkee_cybersecurity_aboutContainer11__1dO_p{width:598px;justify-content:space-between;margin-top:8px}.iit_roorkee_cybersecurity_aboutContainerMain__a264j{width:292px;height:100px}.iit_roorkee_cybersecurity_aboutContainerMainRank__dOEOZ{font-size:20px;line-height:32px}.iit_roorkee_cybersecurity_aboutContainerMainRank1__aHJmF{font-size:14px;line-height:32px}.iit_roorkee_cybersecurity_aboutContainerMain1__2wxOT{margin:64px 0 24px 16px}.iit_roorkee_cybersecurity_sec_1__dJ8_0{padding-left:64px;padding-right:40px}.iit_roorkee_cybersecurity_courseNameWeb__Ye1AY{margin-bottom:24px;display:none}.iit_roorkee_cybersecurity_courseNameMobile__Ofj10{display:block}}@media screen and (max-width:1300px){.iit_roorkee_cybersecurity_facultyHeader___CJQI{padding-left:40px;justify-content:flex-start}.iit_roorkee_cybersecurity_facultyMain__S3snE{flex-direction:column;justify-content:center;align-items:center;padding:48px 0}.iit_roorkee_cybersecurity_partnerCard__xD9Gf{width:530px;height:250px;margin-right:0;margin-bottom:32px}.iit_roorkee_cybersecurity_partnerImage__oQ_OG{width:212px;height:250px}.iit_roorkee_cybersecurity_partnerWeb2__PqL7q{display:none}.iit_roorkee_cybersecurity_partnerMobile__5Hp5x{display:block}.iit_roorkee_cybersecurity_aboutEnquire__aVP_d{margin-top:40px;margin-bottom:64px}.iit_roorkee_cybersecurity_weba_new_controls__0a6fy,.iit_roorkee_cybersecurity_weba_new_controlss__pNAjJ{display:flex;flex-direction:row;justify-content:flex-end;width:96%;margin:40px 0 0}.iit_roorkee_cybersecurity_webControlFaculty__0uMhh{display:block}.iit_roorkee_cybersecurity_faculty__xvbk9{padding:0 0 64px}.iit_roorkee_cybersecurity_facultyMobile__7ct8g{padding-left:40px;padding-bottom:0;padding-right:0}.iit_roorkee_cybersecurity_facultyMobile12__taV1m>div>div{display:flex;flex-direction:row;justify-content:flex-start}.iit_roorkee_cybersecurity_facultyHead__RzcK4{padding-top:64px}}@media screen and (max-width:1250px){.iit_roorkee_cybersecurity_projectHeaderDiv__fqdbD{margin:80px 0 0 40px}.iit_roorkee_cybersecurity_certificatecontainerdiv__vxnNI{display:flex;flex-direction:column}.iit_roorkee_cybersecurity_certiMainconatiner__9nQtz{width:90%}.iit_roorkee_cybersecurity_projectParaDiv__yJGrk{width:90%;margin:24px 40px 0}.iit_roorkee_cybersecurity_certicontainerdiv3__0YCKR{margin-left:40px;margin-top:24px;width:55%}.iit_roorkee_cybersecurity_certificateMainleftimg__nIon2{width:94%;margin-left:40px;display:flex;flex-direction:row;justify-content:center}.iit_roorkee_cybersecurity_partnerZoom__UhzOK{position:absolute;bottom:2vh;right:27vw}}@media screen and (max-width:1150px){.iit_roorkee_cybersecurity_projectMain__MhQOw{margin:48px 0 0 40px}.iit_roorkee_cybersecurity_ourAlumni__AD6_q{margin-top:128px}.iit_roorkee_cybersecurity_projectHeaderDiv12__ff7nO{margin:64px 40px 0}.iit_roorkee_cybersecurity_projectParaDiv12___ZAMD{margin:24px 40px 0}.iit_roorkee_cybersecurity_grow__whG6b{padding:96px 40px 0}.iit_roorkee_cybersecurity_growMargin__jXsqW{margin-bottom:64px}.iit_roorkee_cybersecurity_feeSection__tMdC2{padding:64px 120px}.iit_roorkee_cybersecurity_aboutcontainerdiv2__7hpbH{margin:64px 40px 0}.iit_roorkee_cybersecurity_uniqueMain__tre5n{margin:48px 40px 0}.iit_roorkee_cybersecurity_aboutContainer__CG6Ly{margin:64px 40px 80px;gap:0}.iit_roorkee_cybersecurity_alumni__DB94W{margin-bottom:32px}.iit_roorkee_cybersecurity_similiarProgram_cs__ljSPF{padding:80px 0 80px 40px;width:auto}}@media screen and (max-width:900px){.iit_roorkee_cybersecurity_calendar__KoU94{background-image:url(https://cdn.pegasus.imarticus.org/iit_roorkee_dm/New3.webp)}.iit_roorkee_cybersecurity_modeOfTraining__IJKjH{background-image:url(https://cdn.pegasus.imarticus.org/iit_roorkee_dm/New4.webp)}.iit_roorkee_cybersecurity_students__qRTXn{background-image:url(https://cdn.pegasus.imarticus.org/iit_roorkee_dm/New5.webp)}.iit_roorkee_cybersecurity_time__VvbLw{background-image:url(https://cdn.pegasus.imarticus.org/iit_roorkee_dm/New6.webp)}.iit_roorkee_cybersecurity_externalDivHeader__RGhUw{font-size:14px;line-height:24px}.iit_roorkee_cybersecurity_externalDivHeaderPara__wdSsM{font-size:16px;line-height:22px}.iit_roorkee_cybersecurity_similiarProgram_cs__ljSPF{padding:64px 0 64px 40px;width:auto}}@media screen and (max-width:750px){.iit_roorkee_cybersecurity_aboutContainerImage__BqWYG{width:328px;height:90px;padding:16px 32px}.iit_roorkee_cybersecurity_aboutContainer1__YntuO{margin:24px 0 0}.iit_roorkee_cybersecurity_aboutContainer11__1dO_p{width:328px;justify-content:space-between;margin-top:8px}.iit_roorkee_cybersecurity_aboutContainerMain__a264j{width:160px;height:70px}.iit_roorkee_cybersecurity_aboutContainerMainRank__dOEOZ{font-size:12px;line-height:16px}.iit_roorkee_cybersecurity_aboutContainerMainRank1__aHJmF{font-size:14px;line-height:16px}.iit_roorkee_cybersecurity_aboutContainerMain1__2wxOT{margin:32px 16px 24px}.iit_roorkee_cybersecurity_aboutContainerMainHead__SAwUb{font-size:60px;line-height:32px}.iit_roorkee_cybersecurity_aboutContainer__CG6Ly{width:100%;margin:48px 0 0}.iit_roorkee_cybersecurity_aboutContainerMain1para__xHzQ0{font-size:24px;line-height:32px}.iit_roorkee_cybersecurity_aboutContainerMainHead1__XDnXh{margin-left:8px}}@media screen and (max-width:650px){.iit_roorkee_cybersecurity_sec_1_mobiles__BUWXE{background:url(https://cdn.pegasus.imarticus.org/iit_roorkee_cs/Group_3091.webp);background-color:#377174;padding:48px 8px 48px 24px;background-size:cover;background-repeat:no-repeat;background-position:50%;width:100%}.iit_roorkee_cybersecurity_courseName__2Tg2E{padding-top:32px}.iit_roorkee_cybersecurity_sec_para__GRXq3{font-size:28px;line-height:32px}.iit_roorkee_cybersecurity_sec1_para__1rj9g{font-size:18px;line-height:24px}.iit_roorkee_cybersecurity_headerImage__ZL8mu,.iit_roorkee_cybersecurity_sec1_para2__xPuB2{margin-top:32px}.iit_roorkee_cybersecurity_cardsHolder__gpDmn{display:block;overflow:hidden}.iit_roorkee_cybersecurity_card__X3Doy{width:50%;display:flex;align-items:center;justify-content:center;flex-direction:column;padding:16px;float:left}.iit_roorkee_cybersecurity_card__X3Doy .iit_roorkee_cybersecurity_icon__mdxro{height:48px;width:48px;position:relative}.iit_roorkee_cybersecurity_card__X3Doy .iit_roorkee_cybersecurity_heading__NnChZ{font-size:16px;font-weight:400;line-height:24px;color:#3c4852;text-align:center;padding-top:16px;padding-bottom:8px}.iit_roorkee_cybersecurity_card__X3Doy .iit_roorkee_cybersecurity_subHeading__EdrBK{font-size:16px;font-weight:600;line-height:24px;color:#3c4852;text-align:center}}@media screen and (max-width:600px){.iit_roorkee_cybersecurity_similiarProgram_cs__ljSPF{padding:48px 0 48px 16px;width:auto}.iit_roorkee_cybersecurity_projectCard1__C5qTV{width:300px}.iit_roorkee_cybersecurity_projectCard__rIR3W{width:270px;overflow:scroll}.iit_roorkee_cybersecurity_projectCardImage__Bf7b_{width:270px}.iit_roorkee_cybersecurity_projectMain__MhQOw{margin:40px 0 0 16px}.iit_roorkee_cybersecurity_projectParaDiv12___ZAMD{margin:24px 16px 0}.iit_roorkee_cybersecurity_projectHeaderDiv__fqdbD{margin:64px 0 0 16px}.iit_roorkee_cybersecurity_projectHeaderDiv12__ff7nO{margin:48px 16px 0}.iit_roorkee_cybersecurity_projectParaDiv__yJGrk{margin-left:16px;margin-right:0;width:100%}.iit_roorkee_cybersecurity_certicontainerdiv3__0YCKR{flex-direction:column;margin-top:16px;margin-left:16px;width:100%}.iit_roorkee_cybersecurity_certificateMainleftimg__nIon2{width:100%;margin:0 0 48px}.iit_roorkee_cybersecurity_grow__whG6b{background-image:none;padding:48px 16px 0}.iit_roorkee_cybersecurity_growMargin__jXsqW{margin-top:8px;margin-bottom:48px}.iit_roorkee_cybersecurity_facultyMobile__7ct8g{display:none}.iit_roorkee_cybersecurity_faculty__xvbk9{padding:0 0 48px}.iit_roorkee_cybersecurity_facultyHead__RzcK4{padding-top:48px;font-size:28px}.iit_roorkee_cybersecurity_partnerCard__xD9Gf{width:100%;height:180px}.iit_roorkee_cybersecurity_partnerpara3__rKd7N{width:100%;font-size:12px;line-height:16px}.iit_roorkee_cybersecurity_partnerpara2__KhNfU{font-size:12px;line-height:16px}.iit_roorkee_cybersecurity_partnerImage__oQ_OG{height:180px}.iit_roorkee_cybersecurity_partnerCard1__A1GTi{width:80%;padding:16px 8px 8px}.iit_roorkee_cybersecurity_partnerWeb2__PqL7q{display:block}.iit_roorkee_cybersecurity_partnerMobile__5Hp5x{display:none}.iit_roorkee_cybersecurity_facultyHeader___CJQI{padding:48px 16px 0}.iit_roorkee_cybersecurity_facultyMain__S3snE{padding:48px 16px 16px}.iit_roorkee_cybersecurity_feeSection__tMdC2{padding:48px 16px}.iit_roorkee_cybersecurity_aboutcontainerdiv2__7hpbH,.iit_roorkee_cybersecurity_uniqueMain__tre5n{margin:48px 16px 0}.iit_roorkee_cybersecurity_aboutEnquire__aVP_d{margin-top:48px;margin-bottom:48px}.iit_roorkee_cybersecurity_alumni__DB94W,.iit_roorkee_cybersecurity_certificateleftimg__MOMvf,.iit_roorkee_cybersecurity_webControlFaculty__0uMhh,.iit_roorkee_cybersecurity_weba_new_controls__0a6fy,.iit_roorkee_cybersecurity_weba_new_controlss__pNAjJ{display:none}.iit_roorkee_cybersecurity_ourAlumni__AD6_q{margin-top:48px}.iit_roorkee_cybersecurity_alumniHeader__qyQ7O{font-size:28px}.iit_roorkee_cybersecurity_certificateleftimgMobile__nHd9f{display:block;margin:40px 16px 0;width:100%;height:230px}.iit_roorkee_cybersecurity_partnerZoom__UhzOK{bottom:1vh;right:6vw}.iit_roorkee_cybersecurity_careerSupportHeader___o9hZ{font-size:28px;line-height:38px}.iit_roorkee_cybersecurity_paymentPadding__dJX_G{padding:0 0 0 4px}.iit_roorkee_cybersecurity_crossPadding__QPXtt{margin-right:-16px;margin-top:-16px}}.iit_roorkee_cybersecurity_section6__stwnt{padding:80px 136px;background-color:#01779f}.iit_roorkee_cybersecurity_cardsec__7ppTA{padding:16px 16px 24px}.iit_roorkee_cybersecurity_heading__NnChZ{width:1170px}.iit_roorkee_cybersecurity_heading__NnChZ h2{font-style:normal;font-weight:700;font-size:34px;line-height:40px;display:flex;align-items:center;text-transform:capitalize;color:#fff}.iit_roorkee_cybersecurity_sec6data__CBMhT{padding-top:24px;width:1170px}.iit_roorkee_cybersecurity_sec6data__CBMhT p{font-style:normal;font-weight:400;font-size:18px;line-height:24px;color:#fff}.iit_roorkee_cybersecurity_mainsec6__wNDtn{padding-top:48px;display:flex;flex-direction:row;gap:32px}.iit_roorkee_cybersecurity_maincard__ig1uG{width:270px;height:398px;background:#fff;border:.5px solid rgba(33,42,57,.25);border-radius:8px}.iit_roorkee_cybersecurity_mainimg__4Q_Ot{border-radius:8px;width:270px;height:130px}.iit_roorkee_cybersecurity_cardheading__kweUf h3{font-style:normal;font-weight:600;font-size:16px;line-height:22px;text-transform:uppercase;color:#3c4852}.iit_roorkee_cybersecurity_carddata__3XBOU{padding-top:16px}.iit_roorkee_cybersecurity_carddata__3XBOU p{font-style:normal;font-weight:400;font-size:16px;line-height:22px;color:#3c4852}.iit_roorkee_cybersecurity_Qasection__N55Kk{padding:104px 136px 0}.iit_roorkee_cybersecurity_emiheading__orsyc{font-style:normal;font-weight:600;font-size:18px;line-height:24px;display:flex;align-items:center;text-align:center;color:#68c29d;padding-top:32px}.iit_roorkee_cybersecurity_tools__7_KfT{padding:104px 136px}.iit_roorkee_cybersecurity_toolheading__5C8Ww h2{font-style:normal;font-weight:700;font-size:34px;line-height:40px;display:flex;align-items:center;color:#3c4852}.iit_roorkee_cybersecurity_toolimages__VQA7C{padding-top:16px;display:flex;flex-direction:row;gap:88px}@media screen and (min-width:600px)and (max-width:900px){.iit_roorkee_cybersecurity_sec_1__dJ8_0{background-image:url(https://cdn.pegasus.imarticus.org/iit_roorkee_cs/Group_3090.webp);background-position:50%;background-size:cover;background-repeat:no-repeat;color:#fff;padding-left:40px;padding-right:40px;width:100%;padding-top:0}.iit_roorkee_cybersecurity_sec_para__GRXq3{font-style:normal;font-weight:700;font-size:34px;line-height:40px;text-transform:capitalize}.iit_roorkee_cybersecurity_sec_main_1_sec__UOvXx{width:100%;padding-bottom:0}.iit_roorkee_cybersecurity_sec_main_1__Ah43n{display:flex;flex-direction:row;justify-content:space-between;width:100%;margin-left:-8px}.iit_roorkee_cybersecurity_Qasection__N55Kk{padding:64px 40px 0}.iit_roorkee_cybersecurity_section6__stwnt{padding:64px 0 64px 40px;background-color:#01779f}.iit_roorkee_cybersecurity_tools__7_KfT{padding:64px 0 64px 40px}.iit_roorkee_cybersecurity_toolimages__VQA7C{padding-top:8px;display:flex;flex-direction:row;gap:48px}.iit_roorkee_cybersecurity_sec1_para2__xPuB2{margin-top:4px}.iit_roorkee_cybersecurity_headerImage__ZL8mu{margin-top:96px;width:482px;height:240.65px}.iit_roorkee_cybersecurity_courseName__2Tg2E{padding-top:40px;width:409px}}@media screen and (max-width:559px){.iit_roorkee_cybersecurity_sec6data__CBMhT{padding-top:32px}.iit_roorkee_cybersecurity_Qasection__N55Kk{padding:48px 16px 0}.iit_roorkee_cybersecurity_section6__stwnt{padding:48px 0 48px 16px;background-color:#01779f}.iit_roorkee_cybersecurity_tools__7_KfT{padding:48px 0 48px 16px}}@media screen and (min-width:902px)and (max-width:1300px){.iit_roorkee_cybersecurity_Qasection__N55Kk{padding:80px 40px 0}.iit_roorkee_cybersecurity_section6__stwnt{padding:80px 40px;background-color:#01779f}.iit_roorkee_cybersecurity_tools__7_KfT{padding:80px 40px}.iit_roorkee_cybersecurity_toolimages__VQA7C{padding-top:64px;display:flex;flex-direction:row;gap:48px}}@media (min-width:901px){.iit_roorkee_cybersecurity_desktop__Hfjq7{display:block}.iit_roorkee_cybersecurity_mobile__L9oBn{display:none}}@media (max-width:900px){.iit_roorkee_cybersecurity_desktop__Hfjq7{display:none}.iit_roorkee_cybersecurity_mobile__L9oBn{display:block}}@media (min-width:1300px){.iit_roorkee_cybersecurity_desktop_project__Ck0s1{display:block}.iit_roorkee_cybersecurity_mobile_project__ROWAa{display:none}}@media (max-width:1299px){.iit_roorkee_cybersecurity_desktop_project__Ck0s1{display:none}.iit_roorkee_cybersecurity_mobile_project__ROWAa{display:block}}@media screen and (max-width:768px){.iit_roorkee_cybersecurity_iitrcybersecurityform__Cy9BI{margin-top:16px}}